Page 2
IEEE 802.11b Hotspot Access Gateway (Wired and Wireless Editions) User’s Guide Version: 1.8 Last Updated: 11/24/2004...
Page 3
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pur- suant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 4
R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Termi- nal Equipment and Satellite Earth Station Equipment) as of April 8, 2000.
Table of Contents 1. Introduction ......................... 1 1.1. Overview........................1 1.2. Features........................1 1.3. Feature Comparison ....................6 1.4. LED Definitions ......................6 2. First-Time Installation and Configuration ................8 2.1. Powering the WLAN Hotspot Access Gateway ............8 2.2. Mounting the WLAN Hotspot Access Gateway on a Wall ........8 2.3.
Page 6
3.3.3.5. Resetting Configuration to Factory Defaults........36 3.3.3.6. Uploading a Certificate and a Private Key File ........36 3.3.4. Setting Time Zone ..................36 3.4. Configuring TCP/IP Related Settings ..............37 3.4.1. Addressing....................37 3.4.1.1. Gateway with a PPPoE-Based DSL/Cable Connection ..... 37 3.4.1.2.
Page 7
3.7.2.1. Basic....................68 3.7.2.2. UPnP ....................69 3.7.2.3. System Log ..................69 3.7.2.4. SNMP ....................70 3.7.3. Auto Recovery ....................70 3.7.3.1. Link Integrity Detection............... 70 3.7.3.2. Periodical Restart ................71 3.7.4. LAN Device Management................71 Appendix A: Default Settings ....................73 Appendix B: Troubleshooting....................
1. Introduction 1.1. Overview The IEEE 802.11b Hotspot Access Gateway enables wireless ISPs, enterprises, or schools to deploy WLANs with user authentication support. Authentication can be achieved using the Web redirection technology or IEEE 802.1x Port-Based Network Access Control. Based on the Web redirection technology, when an unauthenticated wireless user is trying to access a Web page, a logon page is shown instead of the requested page, so that the user can type his/her user name and password for authentication.
Page 9
Walled garden. Some specific URLs can be accessed without authentication. These URLs can be exploited by WISPs for advertisement purposes. SSL username/password protection. Username/password information sent by a wireless client to the access gateway can be encrypted by SSL (Secure Socket Layer).
Page 10
Transmit power control. Transmit power of the wireless AP’s RF module can be ad- justed to change RF coverage of the wireless AP. Associated wireless clients status. Showing the status of every wireless client that is associated with the wireless AP. Detachable antennas.
Page 11
(Point-to-Point Protocol over Ethernet) or DHCP and static IP address assignment. Multiple DSL/Cable connections support. Supporting up to 4 DSL/cable-based Internet connections. All outgoing traffic load from the internal network is shared among the multiple Internet connections, so that total outgoing throughput is increased. Load balancing control.
Page 12
By NAT port mapping. By carefully configuring the NAT port mapping table, the ac- cess gateway knows how to route management packets with specific IP ports to LAN de- vices on the private network. Although the NAT Virtual Server function can be used for this purpose, the access gateway is equipped with specific configuration pages for LAN device management.
and can be viewed using a Web browser. Remote log by SNMP trap. Systems events are sent in the form of SNMP traps to a remote SNMP management server. Auto Recovery. In rare cases, the firmware of the access gateway gets stuck in an invalid state and the access gateway appears to be locked up from end user perspective.
2. First-Time Installation and Configuration 2.1. Powering the WLAN Hotspot Access Gateway Plug the power adapter to an AC socket. Plug the connector of the power adapter to the power jack of the WLAN hotspot access gateway. NOTE: This product is intended to be power-supplied by a Listed Power Unit, marked “Class 2” or “LPS”...
tion of a gateway, an Ethernet network interface card (NIC) should have been installed in the manag- ing computer. NOTE: If you are using the browser, Opera, to configure a gateway, click the menu item File, click Preferences..., click File types, and edit the MIME type, text/html, to add a file extension “.sht” so that Opera can work properly with the Web management pages of the gateway.
If the computer is already set to obtain an IP address automatically, you can use the Win- dows-provided tool, WinIPCfg.exe (on Windows 9x/Me) or IPConfig.exe (on Windows 2000/XP), to re-obtain an IP address from the gateway. WinIPCfg.exe is a GUI program, and has command buttons for releasing the current IP address and re-obtaining an IP address.
Page 18
On the start page, click the ConfigWizard link to use a configuration wizard to quickly change the configuration of the gateway. Fig. 4. The Start page. The first page of the configuration wizard is a welcome page. This page gives a brief description of the configuration process.
2.4.2. ConfigWizard Step 1: Selecting an Operational Mode Fig. 5. Operational modes. If the gateway is to be used with a DSL or cable modem and the IP address assignment for the Ethernet WAN interface is achieved by PPPoE, select Gateway with a PPPoE-Based DSL/Cable Connection.
2.4.3. ConfigWizard Step 2: Configuring TCP/IP Settings 2.4.3.1. Gateway with a PPPoE-Based DSL/Cable Connection Fig. 6. TCP/IP settings for Gateway with a PPPoE-Based DSL/Cable Connection mode. If the gateway was set to be in Gateway with a PPPoE-Based DSL/Cable Connection mode, two IP addresses are needed—one for the Ethernet LAN interface and the other for the WAN interface.
the behavior of the DHCP client of the gateway. In Auto mode, you don’t have to worry about the DHCP process; the device takes care of everything. In Manual mode, there are two buttons on the Start page for you to manually release an obtained IP address (Release) and re-obtain a new one from a DHCP server (Renew).
2.4.3.4. Gateway with Multiple DSL/Cable Connections Fig. 9. TCP/IP settings for Gateway with Multiple DSL/Cable Connections mode. Since the Internet connection can be PPPoE-based, DHCP-based, or Static-IP-based, the addressing settings of each WAN interface are the same as those of Gateway with a PPPoE-Based DSL/Cable Connection, DHCP-Based DSL/Cable Connection, or Gateway with a Static-IP DSL/Cable Connection, respectively.
2.4.5. ConfigWizard Step 4: Reviewing and Applying Set- tings Fig. 11. Settings changes are highlighted in red. Fig. 12. Settings review. On the final page, you can review all the settings you have made. Changes are highlighted in red. If they are OK, click Save &...
2.4.6. Configuring User Authentication Settings All editions of the WLAN hotspot access gateway support Web redirection-based user authentication. Furthermore, the Wireless Advanced edition of the access gateway, which has a built-in access point, supports IEEE 802.1x-based user authentication. After the IP addressing settings have been set using ConfigWizard, you have to configure Web redi- rection settings and/or IEEE 802.1x settings for wireless user authentication.
RADIUS server. 2.4.7. Configuring RADIUS Settings The RADIUS client on the WLAN hotspot access gateway works in conjunction with the Web redi- rection component and IEEE 802.1x component for wireless user authentication. The Web redirection and IEEE 802.1x components are responsible for acquiring user credential information, and the RA- DIUS client communicates with a back end RADIUS server using the user credential information.
2.5. Deploying the WLAN Hotspot Access Gateway After the settings have been configured, deploy the gateway to the field application environment. You have to connect AP(s), modem(s), and RADIUS server(s) to the gateway. The system configuration in Fig. 16 illustrates how to deploy the WLAN hotspot access gateway. NOTE: The wireless model of WLAN hotspot access gateway has a built-in access point.
2.6.1. Configuring IEEE 802.11b-Related Settings Before the TCP/IP networking system of a wireless client computer can communicate with other hosts, the underlying wireless link must be established between this wireless computer and a deployed AP or the wireless access gateway’s built-in AP. To establish a wireless link to an AP: Launch the configuration/monitoring utility provided by the vendor of the installed WLAN NIC.
Page 28
Establish a wireless link from the wireless client computer or PDA to an AP that is controlled by the gateway. On the wireless client computer or PDA, run a Web browser, and then go to a Web site on the Internet, e.g., http://www.wi-fi.com.
Page 29
Fig. 20. Log-off window. Click Log Off within the log-off window to end the session. NOTE: On a PDA such as Pocket PC, the log-off would not be shown. To log off from the network, go back to the Log-on page, and then click Log Off to end the session. If the user name or password is invalid, you will be prompted to try again or cancel the authen- tication process.
3. Using Web-Based Network Manager In this chapter, we’ll explain each Web management page of the Web-based Network Manager in de- tail. 3.1. Overview Fig. 22. The Start page. 3.1.1. Menu Structure The left side of the start page contains a menu for you to carry out commands. Here is a brief descrip- tion of the hyperlinks on the menu: Home.
Page 31
access gateway’s built-in AP. Authenticated Users. The status and statistics of the RADIUS-authenticated users. DHCP Mappings. Current IP-MAC address mappings. System Log. Event log for what has happened inside the gateway. Session List. Latest 50 incoming and 50 outgoing user traffic sessions processed by the NAT server component of the gateway.
ing wireless data. Authentication. Wireless user authentication settings. Web Redirection. Web redirection settings for how a wireless user’s HTTP request is “redirected” for authentication. RADIUS. RADIUS settings for communication with the primary and secondary RADIUS servers. Session Control. Settings for controlling lifetimes of user authentication sessions. Auth Page Customization.
Fig. 24. Settings have been changed. 3.1.3. Home and Refresh Commands Fig. 25. Home and Refresh. At the bottom of each status page that shows read-only information, there are two buttons—Home and Refresh. Clicking Home brings you back to the start page. Clicking Refresh updates the shown status information.
3.2. Viewing Status 3.2.1. Associated Wireless Clients Fig. 26. Status of associated wireless clients. On this page, the status information of each associated client, including its MAC address, IP address, user name (if the client has been IEEE 802.1x authenticated), number of bytes it has sent, number of bytes it has received, and the time of its last activity, is shown.
Fig. 28. Authenticated RADIUS user detailed information. Any authenticated user can be terminated by clicking the corresponding Terminate link so that this user is blocked from using networking services provided by the gateway. A terminated user is moved to the Terminated Users Table. Clicking the corresponding Release link puts a terminated user back into authenticated state.
3.2.4. System Log Fig. 31. System log. The system log shows events happening inside the gateway since the gateway starts up. The logged information is useful for troubleshooting purposes. For example, if the password configured for PPPoE is incorrect, this error can be easily spotted by inspecting the system log. The system events are divided into several categories, and you can select which categories of events to log.
3.2.6. Managed LAN Devices Fig. 34. Managed LAN devices. On this page, the status of every managed LAN device is shown. The Offline status indicates a non- working device while the Online status indicates a working device. The Add Device button serves as a shortcut to the Advanced, LAN Device Management configuration page, on which you can specify which devices to manage.
tionality. The IP address of the Ethernet WAN interface is obtained automatically by DHCP from the ISP. Gateway with a Static-IP DSL/Cable Connection. In this mode, the gateway assumes that a DSL or cable modem is connected to its Ethernet WAN interface. The client computers can therefore share this DSL/cable-based Internet connection by the NAT server functionality.
backup, configuration restore, and configuration reset. Firmware upgrade, configuration backup, and configuration restore can be achieved via HTTP or TFTP. The HTTP-based way is suggested because it’s more user friendly. However, due to different behavior of different Web browser versions, HTTP-based firmware management operations may not work properly with some Web browsers.
name is the access gateway’s MAC address. The firmware file path will be shown in the Firm- ware file name text box. Click Restore to upload the configuration file to the access gateway. 3.3.3.3. Upgrading Firmware by TFTP Fig. 41. TFTP server settings. When use TFTP as the firmware management protocol, you can configure settings for the access gateway’s TFTP client to communicate with a TFTP server.
Fig. 43. TFTP Server. NOTE: After the dialog box of the TFTP server program appears, be sure to specify the working folder within which the downloaded firmware files reside. NOTE: Make sure the Accept read requests check box of TFTP Server is selected. NOTE: The LAN IP address of the gateway and the IP address of the TFTP server must be in the same IP subnet for TFTP to work.
Page 42
To back up configuration of the access gateway by TFTP: Get a computer that will be used as a TFTP server and as a managing computer to trigger the backup process. Connect the computer and one of the LAN Ethernet switch port with a normal Ethernet cable. Configure the IP address of the computer so that the computer and the gateway are in the same IP subnet.
configuration backup/restore to succeed. 3.3.3.5. Resetting Configuration to Factory Defaults Fig. 45. Configuration reset. Clicking the Reset button resets the device configuration to factory defaults. WARNING: Think twice before clicking the Reset button. You’ll lose all your current configuration settings. 3.3.3.6.
where you are. If your location adopts Daylight Saving Time, enable Daylight saving. 3.4. Configuring TCP/IP Related Settings 3.4.1. Addressing The addressing settings depend on the operational mode of the gateway. Each operational mode re- quires different addressing settings. 3.4.1.1. Gateway with a PPPoE-Based DSL/Cable Connection Fig.
3.4.1.2. Gateway with a DHCP-Based DSL/Cable Connection Fig. 49. TCP/IP settings for Gateway with a DHCP-Based DSL/Cable Connection mode. If the gateway was set to be in Gateway with a DHCP-Based DSL/Cable Connection mode, two IP addresses are needed—one for the Ethernet LAN interface and the other for the WAN interface. The LAN IP address must be set manually to a private IP address, say 192.168.0.xxx.
address is 192.168.0.1 and the default subnet mask is 255.255.255.0. In most cases, these default set- tings need no change. As for the WAN IP address, it must be manually set. Consult your ISP for the correct IP address, Default gateway, Subnet mask, Primary DNS server, and Secondary DNS server settings. Custom MAC Address of WAN Interface enables you to change the MAC address of the Ethernet WAN interface.
3.4.2.1. Basic Fig. 52. Basic DNS proxy settings. In this section of the page, you specify the IP addresses of the DNS servers, when the gateway is in Gateway with a Static-IP DSL/Cable Connection mode. In other modes, the gateway obtains the DNS server information automatically from the ISP.
3.4.3. NAT Server 3.4.3.1. Basic Fig. 54. Basic NAT server settings. When the gateway is in Gateway with a Static-IP DSL/Cable Connection mode, the NAT server functionality can be enabled or disabled. You can restrict the maximum number of user traffic sessions by specifying the Max number of ses- sions per user setting.
server, and 61.16.33.116 for their public POP3 server. And the administrator has registered with In- terNIC (Internet Network Information Center) some domain name-to-IP address map- pings—www.abc.com to 61.16.33.115 and pop3.abc.com to 61.16.33.116. However, the public Web server and POP3 server for ABC Technology sit on the intranet and use private IP addresses, 192.168.0.2 and 192.168.0.3, respectively.
Click Add. And then you’ll see the new mapping appears in the Virtual Server Mappings ta- ble. To remove a virtual server mapping: Click Delete next to the mapping you want to remove. 3.4.4. DHCP Server 3.4.4.1. Basic Fig. 57. Basic DHCP server settings. The gateway can automatically assign IP addresses to client computers by DHCP.
3.4.4.2. Static DHCP Mappings Fig. 58. Static DHCP mappings. IP addresses of servers are often static so that clients could always locate the servers by the static IP addresses. By Static DHCP Mappings, you can ensure that a host will get the same IP address when it requests one from the DHCP server.
cally communicates with its DDNS server at an interval specified by the Update interval setting. 3.4.6. Bandwidth Management 3.4.6.1. LAN-to-WAN Load Balancing You can specify policies for forcing specific LAN-to-WAN traffic to go out to the Internet through a specific WAN interface when the gateway is configured to be in a multi-WAN mode. LAN-to-WAN traffic can be classified by port range or by IP address range.
To specify a by-IP-address-range policy: Specify the Starting IP address, End IP address, and the WAN Interface for this kind of LAN-to-WAN traffic. Click Add. Then this policy will be shown in the Port Range Policy table. If you want to remove this policy, click the corresponding Delete button. 3.4.6.2.
Page 54
Click Add. Then this policy will be shown in the By IP Address Range Policy table. If you want to remove this policy, click the corresponding Delete button. Policy by MAC Address Fig. 64. By-MAC-address policy for client bandwidth control. To specify a by-MAC-address policy: Specify the MAC address, Max upload rate, and Max download rate for the client to limit its maximum bandwidth consumption.
3.4.7. PPTP Client Fig. 65. PPTP and Virtual Second LAN. By PPTP and Virtual Second LAN, a WISP can securely manage access points behind the access gateway that acts as an NAT server. As illustrated in Fig. 65, the access gateway exposes two LAN-side private networks—one is for the wireless clients (Physical First LAN: 192.168.0.xxx) and the other is for the access points (Virtual Second LAN: 10.0.0.xxx).
3.4.7.1. Basic Fig. 66. Basic PPTP client settings. To establish a PPTP tunnel with a remote PPTP server, specify the IP address of the PPTP server, user name and password for authentication. And then, enable the PPTP client Functionality. NOTE: Configure your PPTP server to use MS-CHAPv1 as the authentication method and to assign IP addresses to PPTP clients.
3.5. Configuring IEEE 802.11b-Related Settings 3.5.1. Communication 3.5.1.1. Basic IEEE 802.11b-related communication settings include AP functionality, Regulatory domain, Channel number, and Network name (SSID), Data rate, and Transmit power. Fig. 69. IEEE 802.11b communication settings. For specific needs such as configuring the wireless access gateway as a wireless LAN-to-LAN bridge, the AP functionality can be disabled, so that no wireless client can associate with the wireless access gateway.
3.5.1.3. Wireless Distribution System Notebook Computer Wireless Access AP/Bridge Gateway Fig. 71. Wireless Distribution System. Traditionally, access points are connected by Ethernet. By Wireless Distribution System (WDS), APs can communicate with one another wirelessly. For example, in Fig. 71, the wireless access gateway acts as an access point for the notebook computers and it forwards packets sent from the notebook computers to the AP/bridge through WDS.
3.5.2. Security 3.5.2.1. Basic Fig. 73. IEEE 802.11b basic security settings. For security reasons, it’s highly recommended that the security mode be set to options other than Open System. When the security mode is set to Open System, no authentication and data encryption will be performed.
Page 60
STA 1 STA 3 STA 2 AP 1 AP 2 WCI: WCI: All APs in This All APs in This Subnet Subnet Switch Wireless Link Ethernet Link Fig. 75. Behavior of the “All APs on This Subnet” wireless client isolation option. As illustrated in Fig.
tificate-based EAP-TLS user authentication and data encryption is used. Session keys are 128-bit. See Section 3.5.2.3 for more information about IEEE 802.1x. NOTE: Each field of a WEP key setting is a hex-decimal number from 00 to FF. For example, when the security mode is set to 64-bit WEP, you could set Key 1 to “00 01 2E 3A DF”.
3.5.2.3. IEEE 802.1x IEEE 802.1x Port-Based Network Access Control is a new standard for solving some security issues associated with IEEE 802.11, such as lack of user-based authentication and dynamic encryption key distribution. With IEEE 802.1x and the help of a RADIUS (Remote Authentication Dial-In User Ser- vice) server and a user account database, an enterprise or ISP (Internet Service Provider) can manage its mobile users’...
3.6. Configuring Authentication Settings All models of the access gateway support Web redirection-based user authentication. Furthermore, the advanced edition of the wireless access gateway, which has a built-in access point, supports IEEE 802.1x-based user authentication. Here is a brief description of how Web redirection works: When an unauthenticated wireless user is trying to access a Web page, a logon page is shown instead of the requested page, so that the user can type his/her user name and password for authentication.
Page 64
HTTP 401 Authorization. In this mode, the 401 authorization method specified in the HTTP standard is used for challenging the user his/her username and password. The username and password information is encrypted by the Base64 algorithm. After the Log On button on the log-on page is clicked, a window appears for the user to enter his/her username and password.
Page 65
Fig. 80. Default log-off page. NOTE: On a PDA such as Pocket PC, the log-off would not be shown. To log off from the network, go back to the log-on page, and then click Log Off to end the session. If the user fails the authentication, the user can be brought to a default warning page (Default page) or a page for the user to subscribe a wireless Internet access service (The following URL).
3.6.1.2. Unrestricted Clients Fig. 83. Unrestricted clients settings. There are occasions on which you want some computers to be able to freely access the Internet with- out being authenticated first. For example, you may want your wired desktop computers connected with the gateway to be uncontrolled by the gateway while providing wireless Internet access service for your customers with wireless laptop computers.
Fig. 85. Sample MAC address list file. To upload a MAC address list file from a TFTP server: Specify the IP address of the TFTP server in the TFTP server IP address text box. Specify the name of the MAC ACL file on the TFTP server in the MAC list file name text box. Click Upload.
walled garden, an HTTP access request to this site is redirected to another site that is “out of” the walled garden. And the user is therefore needs to be authenticated to access this out-of-walled-garden site. Always specify a Web site that actually hosts Web content as a walled garden site. TIP: You can also specify port numbers or port ranges for a walled gardened URL.
Table 2. Allowable authentication modes. IEEE 802.1x IEEE 802.1x IEEE 802.1x disabled EAP-MD5 EAP-TLS Web redirection disabled Web redirection EAP-MD5 Web redirection Web redirection CHAP The gateway can be configured to communicate with two RADIUS servers. When the primary RA- DIUS server fails to respond, the gateway will try to communicate with the secondary RADIUS server.
handshaking between JavaScript code in the log-off authentication page and the gateway. The log-off page notifies the gateway periodically to announce user existence. When this mechanism for user ex- istence detection is enabled (Keep alive functionality), the gateway will terminate a user if no notifi- cation is received from the log-off page on the user’s computer within the number of minutes speci- fied by the Keep alive interval setting.
Page 71
Fig. 92. Authentication success page customization settings. Fig. 93. Authentication failure page customization settings. In addition to the Text alignment, HTML title, and Contents setting, two more settings are provided for specifying the size of the Log-Off window (Windows width and Window height). Fig.
3.7. Configuring Advanced Settings 3.7.1. Filters and Firewall 3.7.1.1. Packet Filters Fig. 97. Packet filters settings. You can specify rules for the firewall component of the gateway to check outgoing packets. Packets that meet the rules can be permitted or denied. The protocol field, source IP address field, destination IP address field, and destination port field of a packet’s IP header are inspected to see if it meets a rule.
Specify the protocol type, source IP address, source IP mask, destination IP address, desti- nation IP mask, and destination port for the rule. Then specify in the Action setting how to deal with a packet that meets the rule. Select the corresponding Enabled check box. NOTE: Set the rules with great care since incorrect rules would make the gateway inaccessible.
3.7.1.4. URL Filters Fig. 100. URL filters settings. The gateway is capable of blocking HTTP traffic from the intranet to specified unwelcome Web sites. To block HTTP traffic to an unwelcome Web site: Specify the URL (ex. www.xxx.com) of the unwelcome Web site. Select the corresponding Enabled check box.
Type the Starting IP address and the End IP Address of the host IP address range. Select the corresponding check box next to the IP address range. 3.7.2.2. UPnP Fig. 102. UPnP settings. UPnP (Universal Plug and Play) enables a Windows XP user to automatically discover peripheral de- vices by HTTP.
3.7.2.4. SNMP Fig. 104. SNMP settings. The gateway can be managed by SNMP (Simple Network Management Protocol), and the SNMP management functionality can be disabled. You can specify the name (used as a password) of the read-only and read-write community. In addition, up to 5 SNMP trap targets can be set in the SNMP Trap table.
3.7.3.2. Periodical Restart Fig. 106. Periodical restart settings. The access gateway can be configured to restart at a specific time every day. This mechanism is aimed at solving lockup caused by firmware bugs that surface only after the access gateway has oper- ated for a long time.
Page 79
HTTP 192.168.168.201:80 HTTP 61.16.31.110:60001 HTTP 61.16.31.110:60002 HTTP 192.168.168.202:80 Management SNMP 61.16.31.110:60003 Server SNMP 192.168.168.203:161 Internet (WAN) Fig. 108. Example for LAN device management. To specify a LAN device to manage: Give a name for this device in the Device Name text box. Type the Virtual Port, Device IP Address, Device Port, and Device MAC Address for this device.
Appendix A: Default Settings TIP: Press the Default switch on the housing of a powered-on gateway to reset the configuration set- tings to factory-default values. Setting Name Default Value Global User Name root Password root Operational Mode Gateway with a Static-IP DSL/Cable Connection IEEE 802.11b Regulatory Domain...
Page 81
Method of obtaining an IP Address Set manually IP Address 192.168.0.1 Subnet Mask 255.255.255.0 Default Gateway 0.0.0.0 DHCP Server Functionality Enabled Default Gateway 192.168.0.1 Subnet Mask 255.255.255.0 Primary DNS Server 192.168.0.1 Secondary DNS Server 0.0.0.0 First Allocateable IP Address 192.168.0.2 Allocateable IP Address Count NAT Server Functionality...
Appendix B: Troubleshooting Check the following first: Make sure that the power of the gateway is on and the Ethernet cables are connected firmly to the RJ-45 jacks of the gateway. Make sure that the LED ALV of the gateway is blinking to indicate the gateway is working. Make sure the types of the Ethernet cables are correct.
Page 83
NOTE: If two or more NICs are installed and operating on a client computer, TCP/IP may not work properly due to incorrect entries in the routing table. Use the OS-provided command-line network tool, route.exe, to add or delete entries from the routing table. Or, use Windows-provided Device Manager to disable unnecessary NICs.
Is the modem working? You may find out the answer by directly connecting the modem to a computer. Refer- ring to the manual of the modem if necessary. Are the IP address of the WLAN hotspot access gateway and the IP address of its default gateway in the same IP subnet? Find out the answer on the start page of the Web-Based Network Manager.
Page 85
Fig. 110. Gateway/AP Browser. The WLAN hotspot access gateway stops working and does not respond to Web management requests. The firmware of the WLAN hotspot access gateway may be stuck in an incorrect state. Press the Reset button on the housing of the WLAN hotspot access gateway or un- plug the power connector from the power jack, and then re-plug the connector to re- start the WLAN hotspot access gateway.
Appendix C: Additional Information C-1: Firmware Upgrade Using Xmodem Upgrade Fig. 111. Xmodem Upgrade. To upgrade the firmware of WLAN hotspot access gateway using Xmodem Upgrade over RS232: Power off the WLAN hotspot access gateway whose firmware will be upgraded. Connect the managing PC and the WLAN hotspot access gateway with an RS232 Null Modem cable.
C-2: Distances and Data Rates Important Notice: Maximum distances posted below are actual tested distance thresholds. However, there are many variables such as barrier composition and construction and local environmental inter- ference that may impact your actual distances and cause you to experience distance thresholds far lower than those we post below.
Need help?
Do you have a question about the IWE1200A-G and is the answer not in the manual?
Questions and answers